Browse Definitions :
Definition

Firefox 3.5

Firefox 3.5 is a version of the Mozilla Foundation's Web browser that was released in June 2009. This version of the browser is said to be twice as fast as Firefox 3 and up to five times as fast as IE8. Other reported improvements include enhanced security measures, better support for third-party add-ons and increased implementation of HTML 5.

New features for this version of Firefox include:

  • Integrated video and audio so no external players or plugins are required.
  • Local storage to enable working in Web applications offline.
  • Geolocation for location-aware browsing.
  • Downloadable fonts.
  • Private browsing and the ability to "forget" specified sites.
  • The ability to select which tabs to restore after a browser crash.

Firefox uses the open source Gecko layout engine and is based on the Mozilla browser from which much of its code was originally derived. The source code for Firefox is free, open source software (FOSS) and is released under a tri-license GPL/LGPL/MPL. Mozilla has released Firefox 3.5 for Windows, Linux, and Mac OS X in a variety of languages.

As of June 2009, Firefox controlled 22.5 percent of the browser market, worldwide.


Learn More About IT:
> Get Firefox 3.5 here.
> Mozilla also hosts a Web page for the Firefox 3.5 development community.
> Preston Gralla reviews Firefox 3.5.
> Farhad Manjoo is excited about the implementation of HTML 5 in Firefox 3.5.

This was last updated in July 2009

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close